You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/role-based-access-control/check-access.md
+67-17Lines changed: 67 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,51 +28,101 @@ Follow these steps to open the Azure resource that you want to check access for.
28
28
29
29
1. Open the Azure resource you want to check access for, such as **Management groups**, **Subscriptions**, **Resource groups**, or a particular resource.
30
30
31
-
1.Click the specific resource in that scope.
31
+
1.Select the specific resource in that scope.
32
32
33
33
The following shows an example resource group.
34
34
35
-

35
+
:::image type="content" source="./media/shared/rg-overview.png" alt-text="Screenshot of resource group overview." lightbox="./media/shared/rg-overview.png":::
36
36
37
-
## Step 2: Check access for a user
37
+
## Step 2: Check your access
38
38
39
-
Follow these steps to check the access for a single user, group, service principal, or managed identity to the previously selected Azure resource.
39
+
Follow these steps to check your access to the previously selected Azure resource.
40
+
41
+
If you have a Microsoft Entra ID P2 or Microsoft Entra ID Governance license, [Microsoft Entra Privileged Identity Management (PIM)](/entra/id-governance/privileged-identity-management/pim-configure) functionality is integrated so you should follow the steps on the **PIM** tab.
42
+
43
+
# [Default](#tab/default)
44
+
45
+
1. Select **Access control (IAM)**.
46
+
47
+
The following shows an example of the Access control (IAM) page for a resource group.
48
+
49
+
:::image type="content" source="./media/shared/rg-access-control.png" alt-text="Screenshot of resource group access control and Check access tab." lightbox="./media/shared/rg-access-control.png":::
50
+
51
+
1. On the **Check access** tab, select the **View my access** button.
40
52
41
-
1. Click **Access control (IAM)**.
53
+
An assignments pane appears that lists your access at this scope and inherited to this scope. Assignments at child scopes aren't listed.
54
+
55
+
:::image type="content" source="./media/check-access/rg-check-access-assignments.png" alt-text="Screenshot of role and deny assignments pane." lightbox="./media/check-access/rg-check-access-assignments.png":::
56
+
57
+
# [PIM](#tab/pim)
58
+
59
+
1. Select **Access control (IAM)**.
60
+
61
+
1. On the **My access** tab, view your role assignments at this scope and inherited to this scope. Assignments at child scopes aren't listed.
42
62
43
63
The following shows an example of the Access control (IAM) page for a resource group.
44
64
45
-

65
+
:::image type="content" source="./media/check-access/rg-access-control-pim.png" alt-text="Screenshot of resource group access control and Check access tab for PIM integration." lightbox="./media/check-access/rg-access-control-pim.png":::
46
66
47
-
1. On the **Check access** tab, click the **Check access** button.
67
+
If you have Microsoft Entra Privileged Identity Management (PIM), you also see [eligible and time-bound role assignments](pim-integration.md).
48
68
49
-
1. In the **Check access** pane, click **User, group, or service principal**.
69
+
---
70
+
71
+
## Step 3: Check access for a user
72
+
73
+
Follow these steps to check the access for a single user, group, service principal, or managed identity to the previously selected Azure resource.
74
+
75
+
If you have a Microsoft Entra ID P2 or Microsoft Entra ID Governance license, [Microsoft Entra Privileged Identity Management (PIM)](/entra/id-governance/privileged-identity-management/pim-configure) functionality is integrated so you should follow the steps on the **PIM** tab.
76
+
77
+
# [Default](#tab/default)
78
+
79
+
1. Select **Access control (IAM)**.
80
+
81
+
1. On the **Check access** tab, select the **Check access** button.
82
+
83
+
1. In the **Check access** pane, select **User, group, or service principal**.
50
84
51
85
1. In the search box, enter a string to search the directory for display names, email addresses, or object identifiers.
52
86
53
-

87
+
:::image type="content" source="./media/shared/rg-check-access-select.png" alt-text="Screenshot of Check access select list." lightbox="./media/shared/rg-check-access-select.png":::
54
88
55
-
1.Click the user to open the **assignments** pane.
89
+
1.Select the user to open the **assignments** pane.
56
90
57
91
On this pane, you can see the access for the selected user at this scope and inherited to this scope. Assignments at child scopes aren't listed. You see the following assignments:
58
92
59
93
- Role assignments added with Azure RBAC.
60
94
- Deny assignments added using Azure Blueprints or Azure managed apps.
61
95
- Classic Service Administrator or Co-Administrator assignments for classic deployments.
62
96
63
-

97
+
:::image type="content" source="./media/shared/rg-check-access-assignments-user.png" alt-text="Screenshot of role and deny assignments pane for a user." lightbox="./media/shared/rg-check-access-assignments-user.png":::
64
98
65
-
## Step 3: Check your access
99
+
#[PIM](#tab/pim)
66
100
67
-
Follow these steps to check your access to the previously selected Azure resource.
101
+
1. Select **Access control (IAM)**.
68
102
69
-
1.Click **Access control (IAM)**.
103
+
1.On the **My access** tab, select the **Check access** button.
70
104
71
-
1. On the **Check access** tab, click the **View my access**button.
105
+
A **Check access**pane appears.
72
106
73
-
An assignments pane appears that lists your access at this scope and inherited to this scope. Assignments at child scopes aren't listed.
107
+
1. Select **User, group, or service principal**.
108
+
109
+
1. In the search box, enter a string to search the directory for name or email addresses.
110
+
111
+
:::image type="content" source="./media/shared/rg-check-access-select.png" alt-text="Screenshot of Check access select list." lightbox="./media/shared/rg-check-access-select.png":::
74
112
75
-

113
+
1. Select the user to open the **assignments** pane.
114
+
115
+
On this pane, you can see the access for the selected user at this scope and inherited to this scope. Assignments at child scopes aren't listed. You see the following assignments:
116
+
117
+
- Role assignments added with Azure RBAC.
118
+
- Deny assignments managed by Azure.
119
+
- Classic Service Administrator or Co-Administrator assignments for classic deployments.
120
+
121
+
If you have PIM, you also see a **Eligible assignments** tab with [eligible and time-bound role assignments](pim-integration.md).
122
+
123
+
:::image type="content" source="./media/check-access/rg-check-access-assignments-user-pim.png" alt-text="Screenshot of role and deny assignments pane for a user for PIM integration." lightbox="./media/check-access/rg-check-access-assignments-user-pim.png":::
0 commit comments